ID

VAR-201002-0310


TITLE

UplusFTP server Path parameter remote stack overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2010-3487

DESCRIPTION

UplusFtp is a free green free installation FTP server. A stack overflow vulnerability exists in the UplusFTP server when processing user-submitted HTTP request parameters. A remote attacker can trigger this overflow by submitting an HTTP request containing a very long path parameter to the list.html page, causing arbitrary code to be executed. Easy FTP Server (also known as UplusFTP) is prone to a buffer-overflow vulnerability. Successful exploits may allow attackers to execute arbitrary code within the context of the application. Failed exploit attempts will likely result in a denial-of-service condition

Trust: 0.81

sources: CNVD: CNVD-2010-3487 // BID: 38321

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-3487

AFFECTED PRODUCTS

vendor:upluswaremodel:uplusftpscope:eqversion:1.7.12

Trust: 0.9

vendor:upluswaremodel:uplusftpscope:eqversion:1.7.0.12

Trust: 0.6

vendor:upluswaremodel:uplusftpscope:eqversion:1.7.1.01

Trust: 0.3

vendor:easymodel:ftp server easy ftp serverscope:eqversion:1.72

Trust: 0.3

vendor:upluswaremodel:uplusftpscope:neversion:1.7.1.02

Trust: 0.3

sources: CNVD: CNVD-2010-3487 // BID: 38321

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2010-3487
value: HIGH

Trust: 0.6

CNVD: CNVD-2010-3487
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2010-3487

THREAT TYPE

network

Trust: 0.3

sources: BID: 38321

TYPE

Boundary Condition Error

Trust: 0.3

sources: BID: 38321

PATCH

title:UplusFTP server Path parameter remote stack overflow vulnerability patchurl:https://www.cnvd.org.cn/patchinfo/show/35305

Trust: 0.6

sources: CNVD: CNVD-2010-3487

EXTERNAL IDS

db:BIDid:38321

Trust: 0.9

db:CNVDid:CNVD-2010-3487

Trust: 0.6

sources: CNVD: CNVD-2010-3487 // BID: 38321

REFERENCES

url:http://www.securityfocus.com/bid/38321/info

Trust: 0.6

url:http://sourceforge.net/projects/easyftpsvr/

Trust: 0.3

url:http://www.erisesoft.com/en/uplusftp.php

Trust: 0.3

sources: CNVD: CNVD-2010-3487 // BID: 38321

CREDITS

ThE g0bL!N

Trust: 0.3

sources: BID: 38321

SOURCES

db:CNVDid:CNVD-2010-3487
db:BIDid:38321

LAST UPDATE DATE

2022-05-17T02:07:27.807000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-3487date:2010-02-19T00:00:00
db:BIDid:38321date:2010-07-28T20:05:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-3487date:2010-02-19T00:00:00
db:BIDid:38321date:2010-02-19T00:00:00